Resultados de procura

Limitar resultados
  1. 1

    Technology and privacy : the new landscape /

    Publicado 1997
    Ligazón do recurso
    Licensed eBooks
  2. 2

    Trust in cyberspace /

    Publicado 1999
    Ligazón do recurso
    Licensed eBooks
  3. 3

    Hack proofing XML /

    Publicado 2002
    Ligazón do recurso
    Licensed eBooks
  4. 4

    Nokia network security : solutions handbook / por Maxwell, Doug, CCSI

    Publicado 2002
    Ligazón do recurso
    Licensed eBooks
  5. 5

    Hack proofing your Web applications : the only way to stop a hacker is to think like one.

    Publicado 2001
    Ligazón do recurso
    Licensed eBooks
  6. 6

    Hack proofing Sun Solaris 8 / por Miles, Wyman

    Publicado 2001
    Ligazón do recurso
    Licensed eBooks
  7. 7

    Information security best practices : 200 basic rules / por Stefanek, George L.

    Publicado 2001
    Ligazón do recurso
    Licensed eBooks
  8. 8

    Stealing the network : how to own the box / por Russell, Ryan, 1969-

    Publicado 2003
    Ligazón do recurso
    Licensed eBooks
  9. 9

    Techniques and applications of digital watermarking and content protection / por Arnold, Michael (Michael Konrad), 1964-

    Publicado 2003
    Ligazón do recurso
    Licensed eBooks
  10. 10

    Who goes there? : authentication through the lens of privacy /

    Publicado 2003
    Ligazón do recurso
    Licensed eBooks
  11. 11

    Protecting your library's digital sources : the essential guide to planning and preservation / por Kahn, Miriam (Miriam B.)

    Publicado 2004
    Ligazón do recurso
    Licensed eBooks
  12. 12

    Bluetooth security / por Gehrmann, Christian

    Publicado 2004
    Ligazón do recurso
    Licensed eBooks
  13. 13

    Buffer overflow attacks : detect, exploit, prevent /

    Publicado 2005
    Ligazón do recurso
    Licensed eBooks
  14. 14

    Security and control in information systems : a guide for business and accounting / por Hawker, Andrew

    Publicado 2000
    Ligazón do recurso
    Licensed eBooks
  15. 15

    Penetration tester's open source toolkit / por Long, Johnny

    Publicado 2006
    Ligazón do recurso
    Licensed eBooks
  16. 16

    Basics of contemporary cryptography for IT practitioners / por Ryabko, Boris

    Publicado 2005
    Ligazón do recurso
    Licensed eBooks
  17. 17

    Essential computer security : everyone's guide to e-mail, internet, and wireless security / por Bradley, Tony, 1969-

    Publicado 2006
    Ligazón do recurso
    Licensed eBooks
  18. 18
  19. 19

    Risk management for computer security : Protecting your network and information assets / por Jones, Andy, 1952-

    Publicado 2005
    Ligazón do recurso
    Licensed eBooks
  20. 20

    Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /

    Publicado 2006
    Ligazón do recurso
    Licensed eBooks

Ferramentas de procura: